e2e tests: set all PSa labels instead of just enforcing

This commit is contained in:
Stanislav Laznicka
2023-05-10 15:38:10 +02:00
parent e5cbc51d29
commit 7f532891c9
315 changed files with 351 additions and 351 deletions

View File

@@ -69,7 +69,7 @@ var _ = SIGDescribe("Aggregator", func() {
var aggrclient *aggregatorclient.Clientset var aggrclient *aggregatorclient.Clientset
f := framework.NewDefaultFramework("aggregator") f := framework.NewDefaultFramework("aggregator")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
// We want namespace initialization BeforeEach inserted by // We want namespace initialization BeforeEach inserted by
// NewDefaultFramework to happen before this, so we put this BeforeEach // NewDefaultFramework to happen before this, so we put this BeforeEach

View File

@@ -81,7 +81,7 @@ func restartAPIServer(ctx context.Context, node *v1.Node) error {
// This test requires that --feature-gates=APIServerIdentity=true be set on the apiserver // This test requires that --feature-gates=APIServerIdentity=true be set on the apiserver
var _ = SIGDescribe("kube-apiserver identity [Feature:APIServerIdentity]", func() { var _ = SIGDescribe("kube-apiserver identity [Feature:APIServerIdentity]", func() {
f := framework.NewDefaultFramework("kube-apiserver-identity") f := framework.NewDefaultFramework("kube-apiserver-identity")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("kube-apiserver identity should persist after restart [Disruptive]", func(ctx context.Context) { ginkgo.It("kube-apiserver identity should persist after restart [Disruptive]", func(ctx context.Context) {
e2eskipper.SkipUnlessProviderIs("gce") e2eskipper.SkipUnlessProviderIs("gce")

View File

@@ -46,7 +46,7 @@ import (
var _ = SIGDescribe("ServerSideApply", func() { var _ = SIGDescribe("ServerSideApply", func() {
f := framework.NewDefaultFramework("apply") f := framework.NewDefaultFramework("apply")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var client clientset.Interface var client clientset.Interface
var ns string var ns string

View File

@@ -46,7 +46,7 @@ const numberOfTotalResources = 400
var _ = SIGDescribe("Servers with support for API chunking", func() { var _ = SIGDescribe("Servers with support for API chunking", func() {
f := framework.NewDefaultFramework("chunking") f := framework.NewDefaultFramework("chunking")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func(ctx context.Context) { ginkgo.BeforeEach(func(ctx context.Context) {
ns := f.Namespace.Name ns := f.Namespace.Name

View File

@@ -118,7 +118,7 @@ var alternativeAPIVersions = []apiextensionsv1.CustomResourceDefinitionVersion{
var _ = SIGDescribe("CustomResourceConversionWebhook [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("CustomResourceConversionWebhook [Privileged:ClusterAdmin]", func() {
var certCtx *certContext var certCtx *certContext
f := framework.NewDefaultFramework("crd-webhook") f := framework.NewDefaultFramework("crd-webhook")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
servicePort := int32(9443) servicePort := int32(9443)
containerPort := int32(9444) containerPort := int32(9444)

View File

@@ -53,7 +53,7 @@ var (
var _ = SIGDescribe("CustomResourcePublishOpenAPI [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("CustomResourcePublishOpenAPI [Privileged:ClusterAdmin]", func() {
f := framework.NewDefaultFramework("crd-publish-openapi") f := framework.NewDefaultFramework("crd-publish-openapi")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.16 Release: v1.16

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("CustomResourceValidationRules [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("CustomResourceValidationRules [Privileged:ClusterAdmin]", func() {
f := framework.NewDefaultFramework("crd-validation-expressions") f := framework.NewDefaultFramework("crd-validation-expressions")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var apiExtensionClient *clientset.Clientset var apiExtensionClient *clientset.Clientset
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {

View File

@@ -39,7 +39,7 @@ import (
var _ = SIGDescribe("CustomResourceDefinition Watch [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("CustomResourceDefinition Watch [Privileged:ClusterAdmin]", func() {
f := framework.NewDefaultFramework("crd-watch") f := framework.NewDefaultFramework("crd-watch")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Context("CustomResourceDefinition Watch", func() { ginkgo.Context("CustomResourceDefinition Watch", func() {
/* /*

View File

@@ -45,7 +45,7 @@ import (
var _ = SIGDescribe("CustomResourceDefinition resources [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("CustomResourceDefinition resources [Privileged:ClusterAdmin]", func() {
f := framework.NewDefaultFramework("custom-resource-definition") f := framework.NewDefaultFramework("custom-resource-definition")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Context("Simple CustomResourceDefinition", func() { ginkgo.Context("Simple CustomResourceDefinition", func() {
/* /*

View File

@@ -39,7 +39,7 @@ import (
var storageVersionServerVersion = utilversion.MustParseSemantic("v1.13.99") var storageVersionServerVersion = utilversion.MustParseSemantic("v1.13.99")
var _ = SIGDescribe("Discovery", func() { var _ = SIGDescribe("Discovery", func() {
f := framework.NewDefaultFramework("discovery") f := framework.NewDefaultFramework("discovery")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var namespaceName string var namespaceName string

View File

@@ -39,7 +39,7 @@ import (
var _ = SIGDescribe("Etcd failure [Disruptive]", func() { var _ = SIGDescribe("Etcd failure [Disruptive]", func() {
f := framework.NewDefaultFramework("etcd-failure") f := framework.NewDefaultFramework("etcd-failure")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func(ctx context.Context) { ginkgo.BeforeEach(func(ctx context.Context) {
// This test requires: // This test requires:

View File

@@ -39,7 +39,7 @@ import (
var _ = SIGDescribe("FieldValidation", func() { var _ = SIGDescribe("FieldValidation", func() {
f := framework.NewDefaultFramework("field-validation") f := framework.NewDefaultFramework("field-validation")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var client clientset.Interface var client clientset.Interface
var ns string var ns string

View File

@@ -53,7 +53,7 @@ var (
var _ = SIGDescribe("API priority and fairness", func() { var _ = SIGDescribe("API priority and fairness", func() {
f := framework.NewDefaultFramework("apf") f := framework.NewDefaultFramework("apf")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration", func(ctx context.Context) { ginkgo.It("should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration", func(ctx context.Context) {
testingFlowSchemaName := "e2e-testing-flowschema" testingFlowSchemaName := "e2e-testing-flowschema"

View File

@@ -311,7 +311,7 @@ func getUniqLabel(labelkey, labelvalue string) map[string]string {
var _ = SIGDescribe("Garbage collector", func() { var _ = SIGDescribe("Garbage collector", func() {
f := framework.NewDefaultFramework("gc") f := framework.NewDefaultFramework("gc")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -120,7 +120,7 @@ func testPath(ctx context.Context, client clientset.Interface, path string, requ
var _ = SIGDescribe("health handlers", func() { var _ = SIGDescribe("health handlers", func() {
f := framework.NewDefaultFramework("health") f := framework.NewDefaultFramework("health")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("should contain necessary checks", func(ctx context.Context) { ginkgo.It("should contain necessary checks", func(ctx context.Context) {
ginkgo.By("/health") ginkgo.By("/health")

View File

@@ -233,7 +233,7 @@ func ensureServicesAreRemovedWhenNamespaceIsDeleted(ctx context.Context, f *fram
var _ = SIGDescribe("Namespaces [Serial]", func() { var _ = SIGDescribe("Namespaces [Serial]", func() {
f := framework.NewDefaultFramework("namespaces") f := framework.NewDefaultFramework("namespaces")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.11 Release: v1.11

View File

@@ -46,7 +46,7 @@ import (
var _ = SIGDescribe("OpenAPIV3", func() { var _ = SIGDescribe("OpenAPIV3", func() {
f := framework.NewDefaultFramework("openapiv3") f := framework.NewDefaultFramework("openapiv3")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release : v1.27 Release : v1.27

View File

@@ -36,7 +36,7 @@ import (
var _ = SIGDescribe("client-go should negotiate", func() { var _ = SIGDescribe("client-go should negotiate", func() {
f := framework.NewDefaultFramework("protocol") f := framework.NewDefaultFramework("protocol")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
for _, s := range []string{ for _, s := range []string{
"application/json", "application/json",

View File

@@ -34,7 +34,7 @@ const (
var _ = SIGDescribe("Server request timeout", func() { var _ = SIGDescribe("Server request timeout", func() {
f := framework.NewDefaultFramework("request-timeout") f := framework.NewDefaultFramework("request-timeout")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("should return HTTP status code 400 if the user specifies an invalid timeout in the request URL", func(ctx context.Context) { ginkgo.It("should return HTTP status code 400 if the user specifies an invalid timeout in the request URL", func(ctx context.Context) {
rt := getRoundTripper(f) rt := getRoundTripper(f)

View File

@@ -66,7 +66,7 @@ var extendedResourceName = "example.com/dongle"
var _ = SIGDescribe("ResourceQuota", func() { var _ = SIGDescribe("ResourceQuota", func() {
f := framework.NewDefaultFramework("resourcequota") f := framework.NewDefaultFramework("resourcequota")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.16 Release: v1.16
@@ -1204,7 +1204,7 @@ var _ = SIGDescribe("ResourceQuota", func() {
var _ = SIGDescribe("ResourceQuota [Feature:ScopeSelectors]", func() { var _ = SIGDescribe("ResourceQuota [Feature:ScopeSelectors]", func() {
f := framework.NewDefaultFramework("scope-selectors") f := framework.NewDefaultFramework("scope-selectors")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.It("should verify ResourceQuota with best effort scope using scope-selectors.", func(ctx context.Context) { ginkgo.It("should verify ResourceQuota with best effort scope using scope-selectors.", func(ctx context.Context) {
ginkgo.By("Creating a ResourceQuota with best effort scope") ginkgo.By("Creating a ResourceQuota with best effort scope")
resourceQuotaBestEffort, err := createResourceQuota(ctx, f.ClientSet, f.Namespace.Name, newTestResourceQuotaWithScopeSelector("quota-besteffort", v1.ResourceQuotaScopeBestEffort)) resourceQuotaBestEffort, err := createResourceQuota(ctx, f.ClientSet, f.Namespace.Name, newTestResourceQuotaWithScopeSelector("quota-besteffort", v1.ResourceQuotaScopeBestEffort))
@@ -1385,7 +1385,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:ScopeSelectors]", func() {
var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() { var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
f := framework.NewDefaultFramework("resourcequota-priorityclass") f := framework.NewDefaultFramework("resourcequota-priorityclass")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.", func(ctx context.Context) { ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.", func(ctx context.Context) {
@@ -1727,7 +1727,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
var _ = SIGDescribe("ResourceQuota", func() { var _ = SIGDescribe("ResourceQuota", func() {
f := framework.NewDefaultFramework("cross-namespace-pod-affinity") f := framework.NewDefaultFramework("cross-namespace-pod-affinity")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.It("should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.", func(ctx context.Context) { ginkgo.It("should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.", func(ctx context.Context) {
ginkgo.By("Creating a ResourceQuota with cross namespace pod affinity scope") ginkgo.By("Creating a ResourceQuota with cross namespace pod affinity scope")
quota, err := createResourceQuota( quota, err := createResourceQuota(

View File

@@ -29,7 +29,7 @@ import (
var _ = SIGDescribe("server version", func() { var _ = SIGDescribe("server version", func() {
f := framework.NewDefaultFramework("server-version") f := framework.NewDefaultFramework("server-version")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.19 Release: v1.19

View File

@@ -38,7 +38,7 @@ const (
// This test requires that --feature-gates=APIServerIdentity=true,StorageVersionAPI=true be set on the apiserver and the controller manager // This test requires that --feature-gates=APIServerIdentity=true,StorageVersionAPI=true be set on the apiserver and the controller manager
var _ = SIGDescribe("StorageVersion resources [Feature:StorageVersionAPI]", func() { var _ = SIGDescribe("StorageVersion resources [Feature:StorageVersionAPI]", func() {
f := framework.NewDefaultFramework("storage-version") f := framework.NewDefaultFramework("storage-version")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("storage version with non-existing id should be GC'ed", func(ctx context.Context) { ginkgo.It("storage version with non-existing id should be GC'ed", func(ctx context.Context) {
client := f.ClientSet client := f.ClientSet

View File

@@ -44,7 +44,7 @@ var serverPrintVersion = utilversion.MustParseSemantic("v1.10.0")
var _ = SIGDescribe("Servers with support for Table transformation", func() { var _ = SIGDescribe("Servers with support for Table transformation", func() {
f := framework.NewDefaultFramework("tables") f := framework.NewDefaultFramework("tables")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
e2eskipper.SkipUnlessServerVersionGTE(serverPrintVersion, f.ClientSet.Discovery()) e2eskipper.SkipUnlessServerVersionGTE(serverPrintVersion, f.ClientSet.Discovery())

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy]", func() { var _ = SIGDescribe("ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy]", func() {
f := framework.NewDefaultFramework("validating-admission-policy") f := framework.NewDefaultFramework("validating-admission-policy")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var client clientset.Interface var client clientset.Interface

View File

@@ -48,7 +48,7 @@ const (
var _ = SIGDescribe("Watchers", func() { var _ = SIGDescribe("Watchers", func() {
f := framework.NewDefaultFramework("watch") f := framework.NewDefaultFramework("watch")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.11 Release: v1.11

View File

@@ -80,7 +80,7 @@ const (
var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
var certCtx *certContext var certCtx *certContext
f := framework.NewDefaultFramework("webhook") f := framework.NewDefaultFramework("webhook")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
servicePort := int32(8443) servicePort := int32(8443)
containerPort := int32(8444) containerPort := int32(8444)

View File

@@ -82,7 +82,7 @@ var _ = SIGDescribe("ControllerRevision [Serial]", func() {
}) })
f = framework.NewDefaultFramework("controllerrevisions") f = framework.NewDefaultFramework("controllerrevisions")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
image := WebserverImage image := WebserverImage
dsName := "e2e-" + utilrand.String(5) + "-daemon-set" dsName := "e2e-" + utilrand.String(5) + "-daemon-set"

View File

@@ -54,7 +54,7 @@ const (
var _ = SIGDescribe("CronJob", func() { var _ = SIGDescribe("CronJob", func() {
f := framework.NewDefaultFramework("cronjob") f := framework.NewDefaultFramework("cronjob")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
sleepCommand := []string{"sleep", "300"} sleepCommand := []string{"sleep", "300"}

View File

@@ -208,7 +208,7 @@ func getContainerRestarts(ctx context.Context, c clientset.Interface, ns string,
var _ = SIGDescribe("DaemonRestart [Disruptive]", func() { var _ = SIGDescribe("DaemonRestart [Disruptive]", func() {
f := framework.NewDefaultFramework("daemonrestart") f := framework.NewDefaultFramework("daemonrestart")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
rcName := "daemonrestart" + strconv.Itoa(numPods) + "-" + string(uuid.NewUUID()) rcName := "daemonrestart" + strconv.Itoa(numPods) + "-" + string(uuid.NewUUID())
labelSelector := labels.Set(map[string]string{"name": rcName}).AsSelector() labelSelector := labels.Set(map[string]string{"name": rcName}).AsSelector()
existingPods := cache.NewStore(cache.MetaNamespaceKeyFunc) existingPods := cache.NewStore(cache.MetaNamespaceKeyFunc)

View File

@@ -135,7 +135,7 @@ var _ = SIGDescribe("Daemon set [Serial]", func() {
}) })
f = framework.NewDefaultFramework("daemonsets") f = framework.NewDefaultFramework("daemonsets")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
image := WebserverImage image := WebserverImage
dsName := "daemon-set" dsName := "daemon-set"

View File

@@ -86,7 +86,7 @@ var _ = SIGDescribe("Deployment", func() {
}) })
f := framework.NewDefaultFramework("deployment") f := framework.NewDefaultFramework("deployment")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
c = f.ClientSet c = f.ClientSet

View File

@@ -64,7 +64,7 @@ var defaultLabels = map[string]string{"foo": "bar"}
var _ = SIGDescribe("DisruptionController", func() { var _ = SIGDescribe("DisruptionController", func() {
f := framework.NewDefaultFramework("disruption") f := framework.NewDefaultFramework("disruption")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var ns string var ns string
var cs kubernetes.Interface var cs kubernetes.Interface
var dc dynamic.Interface var dc dynamic.Interface
@@ -77,7 +77,7 @@ var _ = SIGDescribe("DisruptionController", func() {
ginkgo.Context("Listing PodDisruptionBudgets for all namespaces", func() { ginkgo.Context("Listing PodDisruptionBudgets for all namespaces", func() {
anotherFramework := framework.NewDefaultFramework("disruption-2") anotherFramework := framework.NewDefaultFramework("disruption-2")
anotherFramework.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged anotherFramework.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release : v1.21 Release : v1.21

View File

@@ -69,7 +69,7 @@ type watchEventConfig struct {
var _ = SIGDescribe("Job", func() { var _ = SIGDescribe("Job", func() {
f := framework.NewDefaultFramework("job") f := framework.NewDefaultFramework("job")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
parallelism := int32(2) parallelism := int32(2)
completions := int32(4) completions := int32(4)

View File

@@ -51,7 +51,7 @@ import (
var _ = SIGDescribe("ReplicationController", func() { var _ = SIGDescribe("ReplicationController", func() {
f := framework.NewDefaultFramework("replication-controller") f := framework.NewDefaultFramework("replication-controller")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var ns string var ns string
var dc dynamic.Interface var dc dynamic.Interface

View File

@@ -101,7 +101,7 @@ func newPodQuota(name, number string) *v1.ResourceQuota {
var _ = SIGDescribe("ReplicaSet", func() { var _ = SIGDescribe("ReplicaSet", func() {
f := framework.NewDefaultFramework("replicaset") f := framework.NewDefaultFramework("replicaset")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -95,7 +95,7 @@ var httpProbe = &v1.Probe{
// GCE Api requirements: nodes and master need storage r/w permissions. // GCE Api requirements: nodes and master need storage r/w permissions.
var _ = SIGDescribe("StatefulSet", func() { var _ = SIGDescribe("StatefulSet", func() {
f := framework.NewDefaultFramework("statefulset") f := framework.NewDefaultFramework("statefulset")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var ns string var ns string
var c clientset.Interface var c clientset.Interface

View File

@@ -43,7 +43,7 @@ const (
var _ = SIGDescribe("TTLAfterFinished", func() { var _ = SIGDescribe("TTLAfterFinished", func() {
f := framework.NewDefaultFramework("ttlafterfinished") f := framework.NewDefaultFramework("ttlafterfinished")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.It("job should be deleted once it finishes after TTL seconds", func(ctx context.Context) { ginkgo.It("job should be deleted once it finishes after TTL seconds", func(ctx context.Context) {
testFinishedJob(ctx, f) testFinishedJob(ctx, f)

View File

@@ -29,7 +29,7 @@ import (
var _ = SIGDescribe("Conformance Tests", func() { var _ = SIGDescribe("Conformance Tests", func() {
f := framework.NewDefaultFramework("conformance-tests") f := framework.NewDefaultFramework("conformance-tests")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.23 Release: v1.23

View File

@@ -47,7 +47,7 @@ import (
var _ = SIGDescribe("Certificates API [Privileged:ClusterAdmin]", func() { var _ = SIGDescribe("Certificates API [Privileged:ClusterAdmin]", func() {
f := framework.NewDefaultFramework("certificates") f := framework.NewDefaultFramework("certificates")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.19 Release: v1.19

View File

@@ -38,7 +38,7 @@ import (
var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() { var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
f := framework.NewDefaultFramework("node-authn") f := framework.NewDefaultFramework("node-authn")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var ns string var ns string
var nodeIPs []string var nodeIPs []string
ginkgo.BeforeEach(func(ctx context.Context) { ginkgo.BeforeEach(func(ctx context.Context) {

View File

@@ -43,7 +43,7 @@ const (
var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() { var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
f := framework.NewDefaultFramework("node-authz") f := framework.NewDefaultFramework("node-authz")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
// client that will impersonate a node // client that will impersonate a node
var c clientset.Interface var c clientset.Interface
var ns string var ns string

View File

@@ -35,7 +35,7 @@ import (
var _ = SIGDescribe("SelfSubjectReview", func() { var _ = SIGDescribe("SelfSubjectReview", func() {
f := framework.NewDefaultFramework("selfsubjectreviews") f := framework.NewDefaultFramework("selfsubjectreviews")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.28 Release: v1.28

View File

@@ -54,7 +54,7 @@ const rootCAConfigMapName = "kube-root-ca.crt"
var _ = SIGDescribe("ServiceAccounts", func() { var _ = SIGDescribe("ServiceAccounts", func() {
f := framework.NewDefaultFramework("svcaccounts") f := framework.NewDefaultFramework("svcaccounts")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.It("no secret-based service account token should be auto-generated", func(ctx context.Context) { ginkgo.It("no secret-based service account token should be auto-generated", func(ctx context.Context) {
{ {

View File

@@ -35,7 +35,7 @@ import (
var _ = SIGDescribe("[Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling", func() { var _ = SIGDescribe("[Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling", func() {
f := framework.NewDefaultFramework("autoscaling") f := framework.NewDefaultFramework("autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var experiment *gmeasure.Experiment var experiment *gmeasure.Experiment
ginkgo.Describe("Autoscaling a service", func() { ginkgo.Describe("Autoscaling a service", func() {

View File

@@ -62,7 +62,7 @@ type scaleUpTestConfig struct {
var _ = SIGDescribe("Cluster size autoscaler scalability [Slow]", func() { var _ = SIGDescribe("Cluster size autoscaler scalability [Slow]", func() {
f := framework.NewDefaultFramework("autoscaling") f := framework.NewDefaultFramework("autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var c clientset.Interface var c clientset.Interface
var nodeCount int var nodeCount int
var coresPerNode int var coresPerNode int

View File

@@ -95,7 +95,7 @@ const (
var _ = SIGDescribe("Cluster size autoscaling [Slow]", func() { var _ = SIGDescribe("Cluster size autoscaling [Slow]", func() {
f := framework.NewDefaultFramework("autoscaling") f := framework.NewDefaultFramework("autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var c clientset.Interface var c clientset.Interface
var nodeCount int var nodeCount int
var memAllocatableMb int var memAllocatableMb int

View File

@@ -59,7 +59,7 @@ var _ = SIGDescribe("[HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod aut
}) })
f := framework.NewDefaultFramework("horizontal-pod-autoscaling") f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Describe("with Custom Metric of type Pod from Stackdriver", func() { ginkgo.Describe("with Custom Metric of type Pod from Stackdriver", func() {
ginkgo.It("should scale down", func(ctx context.Context) { ginkgo.It("should scale down", func(ctx context.Context) {

View File

@@ -48,7 +48,7 @@ const (
var _ = SIGDescribe("DNS horizontal autoscaling", func() { var _ = SIGDescribe("DNS horizontal autoscaling", func() {
f := framework.NewDefaultFramework("dns-autoscaling") f := framework.NewDefaultFramework("dns-autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var c clientset.Interface var c clientset.Interface
var previousParams map[string]string var previousParams map[string]string
var originDNSReplicasCount int var originDNSReplicasCount int

View File

@@ -44,7 +44,7 @@ const (
// These tests don't seem to be running properly in parallel: issue: #20338. // These tests don't seem to be running properly in parallel: issue: #20338.
var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: CPU)", func() { var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: CPU)", func() {
f := framework.NewDefaultFramework("horizontal-pod-autoscaling") f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
f.NamespacePodSecurityEnforceLevel = api.LevelBaseline f.NamespacePodSecurityLevel = api.LevelBaseline
ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() { ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() {
ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) { ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) {
@@ -149,7 +149,7 @@ var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: C
var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: Memory)", func() { var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: Memory)", func() {
f := framework.NewDefaultFramework("horizontal-pod-autoscaling") f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
f.NamespacePodSecurityEnforceLevel = api.LevelBaseline f.NamespacePodSecurityLevel = api.LevelBaseline
ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() { ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() {
ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) { ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) {

View File

@@ -31,7 +31,7 @@ import (
var _ = SIGDescribe("[Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior)", func() { var _ = SIGDescribe("[Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior)", func() {
f := framework.NewDefaultFramework("horizontal-pod-autoscaling") f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
hpaName := "consumer" hpaName := "consumer"

View File

@@ -218,7 +218,7 @@ var _ = SIGDescribe("Addon update", func() {
var dir string var dir string
var sshClient *ssh.Client var sshClient *ssh.Client
f := framework.NewDefaultFramework("addon-update-test") f := framework.NewDefaultFramework("addon-update-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
// This test requires: // This test requires:

View File

@@ -38,7 +38,7 @@ var upgradeTests = []upgrades.Test{
var _ = SIGDescribe("stateful Upgrade [Feature:StatefulUpgrade]", func() { var _ = SIGDescribe("stateful Upgrade [Feature:StatefulUpgrade]", func() {
f := framework.NewDefaultFramework("stateful-upgrade") f := framework.NewDefaultFramework("stateful-upgrade")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
ginkgo.Describe("stateful upgrade", func() { ginkgo.Describe("stateful upgrade", func() {

View File

@@ -35,7 +35,7 @@ var upgradeTests = []upgrades.Test{
var _ = SIGDescribe("ServiceAccount admission controller migration [Feature:BoundServiceAccountTokenVolume]", func() { var _ = SIGDescribe("ServiceAccount admission controller migration [Feature:BoundServiceAccountTokenVolume]", func() {
f := framework.NewDefaultFramework("serviceaccount-admission-controller-migration") f := framework.NewDefaultFramework("serviceaccount-admission-controller-migration")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
ginkgo.Describe("master upgrade", func() { ginkgo.Describe("master upgrade", func() {

View File

@@ -54,7 +54,7 @@ var upgradeTests = []upgrades.Test{
var _ = SIGDescribe("Upgrade [Feature:Upgrade]", func() { var _ = SIGDescribe("Upgrade [Feature:Upgrade]", func() {
f := framework.NewDefaultFramework("cluster-upgrade") f := framework.NewDefaultFramework("cluster-upgrade")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
// Create the frameworks here because we can only create them // Create the frameworks here because we can only create them
@@ -93,7 +93,7 @@ var _ = SIGDescribe("Upgrade [Feature:Upgrade]", func() {
var _ = SIGDescribe("Downgrade [Feature:Downgrade]", func() { var _ = SIGDescribe("Downgrade [Feature:Downgrade]", func() {
f := framework.NewDefaultFramework("cluster-downgrade") f := framework.NewDefaultFramework("cluster-downgrade")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
ginkgo.Describe("cluster downgrade", func() { ginkgo.Describe("cluster downgrade", func() {

View File

@@ -32,7 +32,7 @@ import (
var _ = SIGDescribe("GKE node pools [Feature:GKENodePool]", func() { var _ = SIGDescribe("GKE node pools [Feature:GKENodePool]", func() {
f := framework.NewDefaultFramework("node-pools") f := framework.NewDefaultFramework("node-pools")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
e2eskipper.SkipUnlessProviderIs("gke") e2eskipper.SkipUnlessProviderIs("gke")

View File

@@ -162,7 +162,7 @@ func waitForMasters(ctx context.Context, masterPrefix string, c clientset.Interf
var _ = SIGDescribe("HA-master [Feature:HAMaster]", func() { var _ = SIGDescribe("HA-master [Feature:HAMaster]", func() {
f := framework.NewDefaultFramework("ha-master") f := framework.NewDefaultFramework("ha-master")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var c clientset.Interface var c clientset.Interface
var ns string var ns string
var additionalReplicaZones []string var additionalReplicaZones []string

View File

@@ -35,7 +35,7 @@ import (
var _ = SIGDescribe("Ports Security Check [Feature:KubeletSecurity]", func() { var _ = SIGDescribe("Ports Security Check [Feature:KubeletSecurity]", func() {
f := framework.NewDefaultFramework("kubelet-security") f := framework.NewDefaultFramework("kubelet-security")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var node *v1.Node var node *v1.Node
var nodeName string var nodeName string

View File

@@ -47,7 +47,7 @@ func kubeProxyDaemonSetExtraEnvs(enableKubeProxyDaemonSet bool) []string {
var _ = SIGDescribe("kube-proxy migration [Feature:KubeProxyDaemonSetMigration]", func() { var _ = SIGDescribe("kube-proxy migration [Feature:KubeProxyDaemonSetMigration]", func() {
f := framework.NewDefaultFramework("kube-proxy-ds-migration") f := framework.NewDefaultFramework("kube-proxy-ds-migration")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
upgradeTestFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) upgradeTestFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
downgradeTestsFrameworks := upgrades.CreateUpgradeFrameworks(downgradeTests) downgradeTestsFrameworks := upgrades.CreateUpgradeFrameworks(downgradeTests)

View File

@@ -35,7 +35,7 @@ var upgradeTests = []upgrades.Test{
var _ = SIGDescribe("gpu Upgrade [Feature:GPUUpgrade]", func() { var _ = SIGDescribe("gpu Upgrade [Feature:GPUUpgrade]", func() {
f := framework.NewDefaultFramework("gpu-upgrade") f := framework.NewDefaultFramework("gpu-upgrade")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests) testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
ginkgo.Describe("master upgrade", func() { ginkgo.Describe("master upgrade", func() {

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("[Disruptive]NodeLease", func() { var _ = SIGDescribe("[Disruptive]NodeLease", func() {
f := framework.NewDefaultFramework("node-lease-test") f := framework.NewDefaultFramework("node-lease-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var systemPodsNo int32 var systemPodsNo int32
var c clientset.Interface var c clientset.Interface
var ns string var ns string

View File

@@ -92,7 +92,7 @@ var _ = SIGDescribe("Reboot [Disruptive] [Feature:Reboot]", func() {
}) })
f = framework.NewDefaultFramework("reboot") f = framework.NewDefaultFramework("reboot")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.It("each node by ordering clean reboot and ensure they function upon restart", func(ctx context.Context) { ginkgo.It("each node by ordering clean reboot and ensure they function upon restart", func(ctx context.Context) {
// clean shutdown and restart // clean shutdown and restart

View File

@@ -44,7 +44,7 @@ const (
var _ = SIGDescribe("Recreate [Feature:Recreate]", func() { var _ = SIGDescribe("Recreate [Feature:Recreate]", func() {
f := framework.NewDefaultFramework("recreate") f := framework.NewDefaultFramework("recreate")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var originalNodes []v1.Node var originalNodes []v1.Node
var originalPodNames []string var originalPodNames []string
var ps *testutils.PodStore var ps *testutils.PodStore

View File

@@ -46,7 +46,7 @@ func resizeRC(ctx context.Context, c clientset.Interface, ns, name string, repli
var _ = SIGDescribe("Nodes [Disruptive]", func() { var _ = SIGDescribe("Nodes [Disruptive]", func() {
f := framework.NewDefaultFramework("resize-nodes") f := framework.NewDefaultFramework("resize-nodes")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var systemPodsNo int32 var systemPodsNo int32
var c clientset.Interface var c clientset.Interface
var ns string var ns string

View File

@@ -45,7 +45,7 @@ func nodeNames(nodes []v1.Node) []string {
var _ = SIGDescribe("Restart [Disruptive]", func() { var _ = SIGDescribe("Restart [Disruptive]", func() {
f := framework.NewDefaultFramework("restart") f := framework.NewDefaultFramework("restart")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var ps *testutils.PodStore var ps *testutils.PodStore
var originalNodes []v1.Node var originalNodes []v1.Node
var originalPodNames []string var originalPodNames []string

View File

@@ -34,7 +34,7 @@ import (
var _ = SIGDescribe("[Feature:CloudProvider][Disruptive] Nodes", func() { var _ = SIGDescribe("[Feature:CloudProvider][Disruptive] Nodes", func() {
f := framework.NewDefaultFramework("cloudprovider") f := framework.NewDefaultFramework("cloudprovider")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var c clientset.Interface var c clientset.Interface
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {

View File

@@ -29,7 +29,7 @@ import (
var _ = SIGDescribe("Networking", func() { var _ = SIGDescribe("Networking", func() {
f := framework.NewDefaultFramework("pod-network-test") f := framework.NewDefaultFramework("pod-network-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Describe("Granular Checks: Pods", func() { ginkgo.Describe("Granular Checks: Pods", func() {

View File

@@ -35,7 +35,7 @@ import (
var _ = SIGDescribe("ConfigMap", func() { var _ = SIGDescribe("ConfigMap", func() {
f := framework.NewDefaultFramework("configmap") f := framework.NewDefaultFramework("configmap")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -55,7 +55,7 @@ const (
var _ = SIGDescribe("Probing container", func() { var _ = SIGDescribe("Probing container", func() {
f := framework.NewDefaultFramework("container-probe") f := framework.NewDefaultFramework("container-probe")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
probe := webserverProbeBuilder{} probe := webserverProbeBuilder{}

View File

@@ -31,7 +31,7 @@ import (
var _ = SIGDescribe("Containers", func() { var _ = SIGDescribe("Containers", func() {
f := framework.NewDefaultFramework("containers") f := framework.NewDefaultFramework("containers")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -35,7 +35,7 @@ import (
var _ = SIGDescribe("Downward API", func() { var _ = SIGDescribe("Downward API", func() {
f := framework.NewDefaultFramework("downward-api") f := framework.NewDefaultFramework("downward-api")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.9 Release: v1.9
@@ -289,7 +289,7 @@ var _ = SIGDescribe("Downward API", func() {
var _ = SIGDescribe("Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages]", func() { var _ = SIGDescribe("Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages]", func() {
f := framework.NewDefaultFramework("downward-api") f := framework.NewDefaultFramework("downward-api")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Context("Downward API tests for hugepages", func() { ginkgo.Context("Downward API tests for hugepages", func() {
ginkgo.It("should provide container's limits.hugepages-<pagesize> and requests.hugepages-<pagesize> as env vars", func(ctx context.Context) { ginkgo.It("should provide container's limits.hugepages-<pagesize> and requests.hugepages-<pagesize> as env vars", func(ctx context.Context) {

View File

@@ -39,7 +39,7 @@ import (
var _ = SIGDescribe("Ephemeral Containers [NodeConformance]", func() { var _ = SIGDescribe("Ephemeral Containers [NodeConformance]", func() {
f := framework.NewDefaultFramework("ephemeral-containers-test") f := framework.NewDefaultFramework("ephemeral-containers-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
podClient = e2epod.NewPodClient(f) podClient = e2epod.NewPodClient(f)

View File

@@ -37,7 +37,7 @@ import (
// https://github.com/kubernetes/community/blob/master/contributors/design-proposals/node/expansion.md // https://github.com/kubernetes/community/blob/master/contributors/design-proposals/node/expansion.md
var _ = SIGDescribe("Variable Expansion", func() { var _ = SIGDescribe("Variable Expansion", func() {
f := framework.NewDefaultFramework("var-expansion") f := framework.NewDefaultFramework("var-expansion")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -32,7 +32,7 @@ import (
var _ = SIGDescribe("ImageCredentialProvider [Feature:KubeletCredentialProviders]", func() { var _ = SIGDescribe("ImageCredentialProvider [Feature:KubeletCredentialProviders]", func() {
f := framework.NewDefaultFramework("image-credential-provider") f := framework.NewDefaultFramework("image-credential-provider")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {

View File

@@ -161,7 +161,7 @@ func initContainersInvariants(pod *v1.Pod) error {
var _ = SIGDescribe("InitContainer [NodeConformance]", func() { var _ = SIGDescribe("InitContainer [NodeConformance]", func() {
f := framework.NewDefaultFramework("init-container") f := framework.NewDefaultFramework("init-container")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
podClient = e2epod.NewPodClient(f) podClient = e2epod.NewPodClient(f)

View File

@@ -36,7 +36,7 @@ import (
var _ = SIGDescribe("Kubelet", func() { var _ = SIGDescribe("Kubelet", func() {
f := framework.NewDefaultFramework("kubelet-test") f := framework.NewDefaultFramework("kubelet-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
podClient = e2epod.NewPodClient(f) podClient = e2epod.NewPodClient(f)

View File

@@ -47,7 +47,7 @@ type KubeletManagedHostConfig struct {
var _ = SIGDescribe("KubeletManagedEtcHosts", func() { var _ = SIGDescribe("KubeletManagedEtcHosts", func() {
f := framework.NewDefaultFramework("e2e-kubelet-etc-hosts") f := framework.NewDefaultFramework("e2e-kubelet-etc-hosts")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
config := &KubeletManagedHostConfig{ config := &KubeletManagedHostConfig{
f: f, f: f,
} }

View File

@@ -54,7 +54,7 @@ func getPatchBytes(oldLease, newLease *coordinationv1.Lease) ([]byte, error) {
var _ = SIGDescribe("Lease", func() { var _ = SIGDescribe("Lease", func() {
f := framework.NewDefaultFramework("lease-test") f := framework.NewDefaultFramework("lease-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.17 Release: v1.17

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("Container Lifecycle Hook", func() { var _ = SIGDescribe("Container Lifecycle Hook", func() {
f := framework.NewDefaultFramework("container-lifecycle-hook") f := framework.NewDefaultFramework("container-lifecycle-hook")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
const ( const (
podCheckInterval = 1 * time.Second podCheckInterval = 1 * time.Second

View File

@@ -40,7 +40,7 @@ import (
var _ = SIGDescribe("NodeLease", func() { var _ = SIGDescribe("NodeLease", func() {
var nodeName string var nodeName string
f := framework.NewDefaultFramework("node-lease-test") f := framework.NewDefaultFramework("node-lease-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func(ctx context.Context) { ginkgo.BeforeEach(func(ctx context.Context) {
node, err := e2enode.GetRandomReadySchedulableNode(ctx, f.ClientSet) node, err := e2enode.GetRandomReadySchedulableNode(ctx, f.ClientSet)

View File

@@ -34,7 +34,7 @@ import (
var _ = SIGDescribe("PodOSRejection [NodeConformance]", func() { var _ = SIGDescribe("PodOSRejection [NodeConformance]", func() {
f := framework.NewDefaultFramework("pod-os-rejection") f := framework.NewDefaultFramework("pod-os-rejection")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.Context("Kubelet", func() { ginkgo.Context("Kubelet", func() {
ginkgo.It("should reject pod when the node OS doesn't match pod's OS", func(ctx context.Context) { ginkgo.It("should reject pod when the node OS doesn't match pod's OS", func(ctx context.Context) {
linuxNode, err := findLinuxNode(ctx, f) linuxNode, err := findLinuxNode(ctx, f)

View File

@@ -188,7 +188,7 @@ func expectNoErrorWithRetries(fn func() error, maxRetries int, explain ...interf
var _ = SIGDescribe("Pods", func() { var _ = SIGDescribe("Pods", func() {
f := framework.NewDefaultFramework("pods") f := framework.NewDefaultFramework("pods")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelRestricted f.NamespacePodSecurityLevel = admissionapi.LevelRestricted
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
var dc dynamic.Interface var dc dynamic.Interface

View File

@@ -43,7 +43,7 @@ const (
var _ = SIGDescribe("PodTemplates", func() { var _ = SIGDescribe("PodTemplates", func() {
f := framework.NewDefaultFramework("podtemplate") f := framework.NewDefaultFramework("podtemplate")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.19 Release: v1.19
Testname: PodTemplate lifecycle Testname: PodTemplate lifecycle

View File

@@ -43,7 +43,7 @@ type PrivilegedPodTestConfig struct {
var _ = SIGDescribe("PrivilegedPod [NodeConformance]", func() { var _ = SIGDescribe("PrivilegedPod [NodeConformance]", func() {
f := framework.NewDefaultFramework("e2e-privileged-pod") f := framework.NewDefaultFramework("e2e-privileged-pod")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
config := &PrivilegedPodTestConfig{ config := &PrivilegedPodTestConfig{
f: f, f: f,
privilegedPod: "privileged-pod", privilegedPod: "privileged-pod",

View File

@@ -39,7 +39,7 @@ import (
var _ = SIGDescribe("Container Runtime", func() { var _ = SIGDescribe("Container Runtime", func() {
f := framework.NewDefaultFramework("container-runtime") f := framework.NewDefaultFramework("container-runtime")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.Describe("blackbox test", func() { ginkgo.Describe("blackbox test", func() {
ginkgo.Context("when starting a container that exits", func() { ginkgo.Context("when starting a container that exits", func() {

View File

@@ -45,7 +45,7 @@ import (
var _ = SIGDescribe("RuntimeClass", func() { var _ = SIGDescribe("RuntimeClass", func() {
f := framework.NewDefaultFramework("runtimeclass") f := framework.NewDefaultFramework("runtimeclass")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
/* /*
Release: v1.20 Release: v1.20

View File

@@ -36,7 +36,7 @@ import (
var _ = SIGDescribe("Secrets", func() { var _ = SIGDescribe("Secrets", func() {
f := framework.NewDefaultFramework("secrets") f := framework.NewDefaultFramework("secrets")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -45,7 +45,7 @@ var (
var _ = SIGDescribe("Security Context", func() { var _ = SIGDescribe("Security Context", func() {
f := framework.NewDefaultFramework("security-context-test") f := framework.NewDefaultFramework("security-context-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
podClient = e2epod.NewPodClient(f) podClient = e2epod.NewPodClient(f)

View File

@@ -40,7 +40,7 @@ var _ = SIGDescribe("Sysctls [LinuxOnly] [NodeConformance]", func() {
}) })
f := framework.NewDefaultFramework("sysctl") f := framework.NewDefaultFramework("sysctl")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
testPod := func() *v1.Pod { testPod := func() *v1.Pod {

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("ConfigMap", func() { var _ = SIGDescribe("ConfigMap", func() {
f := framework.NewDefaultFramework("configmap") f := framework.NewDefaultFramework("configmap")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -34,7 +34,7 @@ import (
var _ = SIGDescribe("Downward API [Serial] [Disruptive] [Feature:EphemeralStorage]", func() { var _ = SIGDescribe("Downward API [Serial] [Disruptive] [Feature:EphemeralStorage]", func() {
f := framework.NewDefaultFramework("downward-api") f := framework.NewDefaultFramework("downward-api")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Context("Downward API tests for local ephemeral storage", func() { ginkgo.Context("Downward API tests for local ephemeral storage", func() {
ginkgo.It("should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars", func(ctx context.Context) { ginkgo.It("should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars", func(ctx context.Context) {

View File

@@ -40,7 +40,7 @@ var _ = SIGDescribe("Downward API volume", func() {
// How long to wait for a log pod to be displayed // How long to wait for a log pod to be displayed
const podLogTimeout = 3 * time.Minute const podLogTimeout = 3 * time.Minute
f := framework.NewDefaultFramework("downward-api") f := framework.NewDefaultFramework("downward-api")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
var podClient *e2epod.PodClient var podClient *e2epod.PodClient
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
podClient = e2epod.NewPodClient(f) podClient = e2epod.NewPodClient(f)

View File

@@ -44,7 +44,7 @@ var (
var _ = SIGDescribe("EmptyDir volumes", func() { var _ = SIGDescribe("EmptyDir volumes", func() {
f := framework.NewDefaultFramework("emptydir") f := framework.NewDefaultFramework("emptydir")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
ginkgo.Context("when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]", func() { ginkgo.Context("when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]", func() {

View File

@@ -36,7 +36,7 @@ import (
// This will require some smart. // This will require some smart.
var _ = SIGDescribe("HostPath", func() { var _ = SIGDescribe("HostPath", func() {
f := framework.NewDefaultFramework("hostpath") f := framework.NewDefaultFramework("hostpath")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {
// TODO permission denied cleanup failures // TODO permission denied cleanup failures

View File

@@ -33,7 +33,7 @@ import (
var _ = SIGDescribe("Projected combined", func() { var _ = SIGDescribe("Projected combined", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
// Test multiple projections // Test multiple projections
/* /*

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("Projected configMap", func() { var _ = SIGDescribe("Projected configMap", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("Projected downwardAPI", func() { var _ = SIGDescribe("Projected downwardAPI", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
// How long to wait for a log pod to be displayed // How long to wait for a log pod to be displayed
const podLogTimeout = 2 * time.Minute const podLogTimeout = 2 * time.Minute

View File

@@ -36,7 +36,7 @@ import (
var _ = SIGDescribe("Projected secret", func() { var _ = SIGDescribe("Projected secret", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -37,7 +37,7 @@ import (
var _ = SIGDescribe("Secrets", func() { var _ = SIGDescribe("Secrets", func() {
f := framework.NewDefaultFramework("secrets") f := framework.NewDefaultFramework("secrets")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
/* /*
Release: v1.9 Release: v1.9

View File

@@ -55,7 +55,7 @@ import (
// TODO(#99468): Check if these tests are still needed. // TODO(#99468): Check if these tests are still needed.
var _ = SIGDescribe("Volumes", func() { var _ = SIGDescribe("Volumes", func() {
f := framework.NewDefaultFramework("volume") f := framework.NewDefaultFramework("volume")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
// note that namespace deletion is handled by delete-namespace flag // note that namespace deletion is handled by delete-namespace flag
// filled in BeforeEach // filled in BeforeEach

View File

@@ -55,7 +55,7 @@ var _ = ginkgo.Describe("[sig-node] DRA [Feature:DynamicResourceAllocation]", fu
// The driver containers have to run with sufficient privileges to // The driver containers have to run with sufficient privileges to
// modify /var/lib/kubelet/plugins. // modify /var/lib/kubelet/plugins.
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
ginkgo.Context("kubelet", func() { ginkgo.Context("kubelet", func() {
nodes := NewNodes(f, 1, 1) nodes := NewNodes(f, 1, 1)

Some files were not shown because too many files have changed in this diff Show More